Explore how to evade intrusion detection systems, firewalls, and honeypots. Examine the use of Nmap to evade firewalls and how to set up a honeypot.
Certified Ethical Hacker - CEHv10: Evading IDS, Firewalls, and Honeypots